General
-
Target
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a
-
Size
1.0MB
-
Sample
240229-rex1ksbh32
-
MD5
8041d9fab3740fbaa0ff927a0908e073
-
SHA1
54e32969e2666415cc1c02c45ad70e3f90d7d938
-
SHA256
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a
-
SHA512
ba80f1d90cd879de0866f5cd5834b0c0122c59c41b3062b5ce30ff954d5bb5600e968fda278c0dd5343166c83a779ed4fcfd085b5149de4434398c7c97b774fa
-
SSDEEP
24576:MymXcVy4JB5oYHDPySOw7yVjwp2eok+RIWGIT6hjpX8T/JSJWe:7mXcVjXoE7yZwvokcuITEjpX8T/Jr
Static task
static1
Behavioral task
behavioral1
Sample
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a
-
Size
1.0MB
-
MD5
8041d9fab3740fbaa0ff927a0908e073
-
SHA1
54e32969e2666415cc1c02c45ad70e3f90d7d938
-
SHA256
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a
-
SHA512
ba80f1d90cd879de0866f5cd5834b0c0122c59c41b3062b5ce30ff954d5bb5600e968fda278c0dd5343166c83a779ed4fcfd085b5149de4434398c7c97b774fa
-
SSDEEP
24576:MymXcVy4JB5oYHDPySOw7yVjwp2eok+RIWGIT6hjpX8T/JSJWe:7mXcVjXoE7yZwvokcuITEjpX8T/Jr
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-